Secure Coding with AI, From Creation to Inspection Authors: Vladislav Belozerov, Peter J Barclay, Ashkan Sami | Published: 2025-04-29 Dataset ApplicabilityProgram AnalysisVulnerability Management 2025.04.29 2025.05.27 Literature Database
SoK: Decoding the Enigma of Encrypted Network Traffic Classifiers Authors: Nimesha Wickramasinghe, Arash Shaghaghi, Gene Tsudik, Sanjay Jha | Published: 2025-03-25 | Updated: 2025-04-14 Dataset ApplicabilityModel Design and AccuracyOverfitting 2025.03.25 2025.05.27 Literature Database